General

  • Target

    eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6.exe

  • Size

    536KB

  • Sample

    241111-das9ya1fmc

  • MD5

    5541a5e3c177c8d1b3287ea6b6e1a83d

  • SHA1

    e7ab4768aefa0c0b9227345663368b1c24fc5d09

  • SHA256

    eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6

  • SHA512

    27f23cf66739727e75c92e5372f85a792b955f709e0153dd557c445c4814badb18efa8148142be0cdc602f618ba1624a9383de26708128f8d6d3d42f5bcc330e

  • SSDEEP

    12288:LMrBy90B409nDMj3ghUTb1gsjT9EJZ6mt+pmp5iCRZzl9:mycbHcb/T6JMmYpmBDx9

Malware Config

Extracted

Family

redline

Botnet

rosn

C2

176.113.115.145:4125

Attributes
  • auth_value

    050a19e1db4d0024b0f23b37dcf961f4

Targets

    • Target

      eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6.exe

    • Size

      536KB

    • MD5

      5541a5e3c177c8d1b3287ea6b6e1a83d

    • SHA1

      e7ab4768aefa0c0b9227345663368b1c24fc5d09

    • SHA256

      eb40ed67103902d8d3f7d78dd7e4e229754db94e3458041f79dee35f738a1cf6

    • SHA512

      27f23cf66739727e75c92e5372f85a792b955f709e0153dd557c445c4814badb18efa8148142be0cdc602f618ba1624a9383de26708128f8d6d3d42f5bcc330e

    • SSDEEP

      12288:LMrBy90B409nDMj3ghUTb1gsjT9EJZ6mt+pmp5iCRZzl9:mycbHcb/T6JMmYpmBDx9

    • Detects Healer an antivirus disabler dropper

    • Healer

      Healer an antivirus disabler dropper.

    • Healer family

    • Modifies Windows Defender Real-time Protection settings

    • RedLine

      RedLine Stealer is a malware family written in C#, first appearing in early 2020.

    • RedLine payload

    • Redline family

    • Executes dropped EXE

    • Windows security modification

    • Adds Run key to start application

MITRE ATT&CK Enterprise v15

Tasks